Flylib.com
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Table of Contents
Back Cover
PC Magazine Windows Vista Security Solutions
Introduction
Part I: Getting Down to the Business of Securing Windows Vista
Chapter 1: A Short Introduction to Securing Windows Vista
The Five Golden Rules of Windows Security
The Security Map
Summary
Chapter 2: Implementing User Accounts and Logon Security
Creating User Accounts
Managing User Accounts
User Account Control and the Run As Command
Summary
Chapter 3: Implementing Password Security
Windows Vista Passwords
Implementing Password and Account Lockout Policies
Storing Passwords Securely
Implementing Additional Password Security Options
Summary
Chapter 4: Using Built-in Tools and Settings to Improve Windows Vista Security
Reviewing the Security Event Log
Using Windows Security Center
Configuring Local Security and Policy Settings
Summary
Part II: Making Surfing Safer
Chapter 5: Securing Your Web Browser
Securing Internet Explorer
Using Other Web Browsers
Summary
Chapter 6: Implementing Parental Controls
Keeping Children Safe Online
Restricting Internet Access Using Parental Controls
Using Content Filtering in Business Environments
Summary
Part III: Protecting Windows Vista Against Internet Threats
Chapter 7: Protecting Windows Vista with a Firewall
Understanding the Role of a Firewall
Configuring Windows Firewall
Using Windows Firewall with Advanced Security
Implementing Third-Party Firewall Software
Testing Your Firewall
Summary
Chapter 8: Keeping Windows Vista Patched and Protected
Windows Vista Update Options
Patching Beyond Vista
Summary
Chapter 9: Protecting Against Viruses
Understanding Viruses
Protecting Against Viruses
Removing Viruses
Summary
Chapter 10: Fighting Malware-Protecting Against Spyware, Adware, and Browser Hijackers
Protecting Against Malware
Removing Malware
Summary
Part IV: Messaging Your Way to E-mail Security
Chapter 11: The Dark Side of Spam
Understanding Spam
Fighting Spam
Summary
Chapter 12: Securing E-mail Messages Using Encryption and Digital Signatures
The Need for E-mail Security
Secure E-mail Components
How Secure E-mail Works
Obtaining, Installing, and Managing Digital Certificates
Signing and Encrypting E-mail Messages
Secure E-mail Alternatives
Summary
Part V: Protecting Your Files
Chapter 13: Controlling Access to Your Personal Files
Using Personal and Public Folders
Configuring File and Folder Security Settings Manually
Summary
Chapter 14: Improving File Security Using Encryption
Protecting Files with EFS
Using a Third-Party Encryption Solution
Summary
Chapter 15: Erasing Files and Hard Drives Securely
Erasing Files Securely
Covering Your Internet Tracks
Erasing Hard Drives Securely
Summary
Part VI: Securing Your Home Network
Chapter 16: Securing Shared Folders and Printers
Sharing Network Resources
Sharing and Securing Folders
Connecting to Shared Folders
Sharing and Securing Printers
Summary
Chapter 17: Securing Windows Vista on Wireless Networks
Securing Wireless Access Points
Limiting Access to Wireless Networks
Securing Wireless Network Traffic with Encryption
Summary
Part VII: Appendixes
Appendix A: Reinstalling Windows Vista
Installing Windows Vista
Post-Installation Tasks
Appendix B: Helpful Windows Vista Security Web Sites
Windows Help and Support Page
Microsoft Security Home Page
TechNet Security Home Page
Windows Vista Security and Protection
Windows Vista Community
PC Magazine Security Watch
The Elder Geek on Windows Vista
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W-X
Y
Z
List of Figures
List of Sidebars
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.1 Authentication with Public Keys
Step 4.4 How to Generate a Key Using PuTTY
Step 6.1 Port Forwarding
Appendix - Sample sshd_config File
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Subqueries
Understanding Transaction Isolation Levels and Concurrent Processing
Understanding Triggers
Working with Ms-sql Server Information Schema View
Working with Stored Procedures
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Using Cisco IPC Express in Retail, Financial, and Healthcare Businesses
IP Telephony Network Deployment Overview
Trunk Signaling Systems
Step 8: Interconnecting Multiple Cisco IPC Express Systems
Troubleshooting Installation Problems
Systematic Software Testing (Artech House Computer Library)
Analysis and Design
Test Implementation
Test Execution
The Software Tester
Appendix E Simplified Unit Test Plan
The Java Tutorial: A Short Course on the Basics, 4th Edition
First Steps (UNIX/Linux)
Summary of Exceptions
Synchronizing Thread
Grouping Threads
Working with Random Access Files
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Indirect Privilege Escalation
Accessing the File System
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies